CN114450897A - Random access method, device, equipment and storage medium - Google Patents

Random access method, device, equipment and storage medium Download PDF

Info

Publication number
CN114450897A
CN114450897A CN201980100853.3A CN201980100853A CN114450897A CN 114450897 A CN114450897 A CN 114450897A CN 201980100853 A CN201980100853 A CN 201980100853A CN 114450897 A CN114450897 A CN 114450897A
Authority
CN
China
Prior art keywords
random access
information
terminal device
message
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201980100853.3A
Other languages
Chinese (zh)
Inventor
胡星星
曾清海
张宏平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN114450897A publication Critical patent/CN114450897A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/02Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas
    • H04B7/04Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas
    • H04B7/08Diversity systems; Multi-antenna system, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the receiving station

Abstract

A random access method, device, equipment and storage medium belong to the technical field of communication. The first network device may return a transmission period indicating the first downlink information to the terminal device according to the transmission time information indicated by the first message sent by the terminal device. Therefore, the terminal device can determine the transmission time interval of the first downlink information according to the second message, and further receive the message sent by the second network device according to the transmission time interval of the first downlink information. Because the transmission time interval of the first downlink information is a time interval specially allocated for the first downlink information, the terminal device will not occupy the transceiver with the first user identity in the process of random access with the second user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of the random access can be improved.

Description

Random access method, device, equipment and storage medium Technical Field
The present application relates to the field of communications technologies, and in particular, to a random access method, apparatus, device, and storage medium.
Background
Currently, more and more terminal devices support the installation of a Universal Subscriber Identity Module (USIM). Taking the example that the terminal device supports two SIM cards, there are many possible implementation manners, such as a Dual SIM Single Standby (DSSS) mode, a Dual SIM Dual Standby (DSDS) mode, or a Dual SIM Dual Active (DSDA) mode.
The DSSS indicates that the terminal device has two SIM cards, but can only reside in a communication system to which one SIM card belongs at the same time, and can reside in a communication system to which different SIM cards belong at different times through user selection. The DSDS indicates that the terminal device can reside in the communication systems to which the two SIMs belong at the same time, but only the communication system to which one SIM card belongs can be in a communication state at the same time, for example, when one SIM card is used to access the internet, the other SIM card cannot be used to answer the call. DSDA means that the terminal device can not only simultaneously reside in the communication system to which the multiple SIM cards belong, but also simultaneously perform communication in the communication systems to which the multiple SIM cards belong, for example, when one SIM card is used to surf the internet, another SIM card can be used to listen to the call.
Before the terminal equipment communicates through the dual SIM cards, each SIM card in the terminal equipment first needs to perform random access to establish connection with the network equipment of the registered network of the corresponding USIM. When one SIM card completes random access and the other SIM card does not perform random access, the interaction between the accessed SIM card and the network device of the corresponding registration network will affect the random access of the other SIM card.
Disclosure of Invention
The embodiment of the application provides a random access method, a random access device, equipment and a storage medium, which can solve the problems of long delay and high failure probability of random access performed by one user identity under the condition that terminal equipment supports two user identities, and further optimize user experience.
In a first aspect, a random access method is provided, which is applied to a first network device, and the method includes: receiving a first message sent by a terminal device with a first user identity, wherein the first message is used for indicating transmission time information of first downlink information, and the first downlink information is information received by the terminal device with a second user identity in a random access process; and sending a second message to the terminal equipment according to the first message, wherein the second message is used for indicating the transmission time interval of the first downlink information.
In this embodiment, the first network device may return a transmission period indicating the first downlink information to the terminal device according to the transmission time information indicated by the first message sent by the terminal device. Therefore, the terminal device can determine the transmission time interval of the first downlink information according to the second message, and further receive the message sent by the second network device according to the transmission time interval of the first downlink information. Because the transmission time interval of the first downlink information is a time interval specially allocated for the first downlink information, the terminal device will not occupy the transceiver with the first user identity in the process of random access with the second user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of the random access can be improved.
Optionally, the transmission time information includes one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, a radio resource control RRC response waiting duration, and a beam recovery duration;
the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
the contention resolution duration refers to a duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be used when the terminal equipment carries out random access in a non-competitive random access mode through the second user identity;
the RRC response waiting time length refers to the time length for the terminal equipment to wait for the second network equipment to return the RRC response message;
the beam recovery duration refers to a duration of random access of the terminal device with the second user identity when performing beam recovery.
Optionally, the implementation process of sending the second message to the terminal device according to the first message may be: determining uplink time domain resources and downlink time domain resources used by the terminal equipment with a first user identity; and sending the second message to the terminal equipment according to the transmission time information and at least one of the uplink time domain resource and the downlink time domain resource.
Optionally, the second message is configured to indicate a first transmission time period and/or a second transmission time period, where the first transmission time period is a transmission time period of the first downlink information, the second transmission time period is a transmission time period of the second downlink information, and the second downlink information refers to information received by the terminal device with the first subscriber identity.
Optionally, the second message further comprises a valid time period of the first transmission period.
In a second aspect, a random access method is provided, and is applied to a terminal device, where the terminal device supports a first subscriber identity and a second subscriber identity, and the method includes: determining a time allocation mode, where the time allocation mode is used to indicate a transmission time period of first downlink information and/or second downlink information, the first downlink information is information received by a terminal device in a random access process with the second user identity, and the second downlink information is information received by the terminal device in a random access process with the first user identity; and receiving the first downlink information according to the time distribution mode.
In this embodiment of the present application, the terminal device may determine a time allocation mode, and since the time allocation mode is used to indicate a transmission period of the first downlink information and/or a transmission period of the second downlink information, according to the time allocation mode, a transmission period during which the terminal device receives the first downlink information sent by the second network device with the second user identity may be determined. Because the transmission time interval of the first downlink information is the time interval specially allocated for the first downlink information, the terminal device performs random access with the second user identity according to the time allocation mode, and the terminal device does not occupy the transceiver with the first user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of the random access is improved.
Optionally, the implementation process of determining the time allocation mode may be: determining the time allocation pattern according to a second message from a first network device, the second message indicating a first transmission period and/or a second transmission period, the first transmission period being a transmission period of the first downlink information, the second transmission period being a transmission period of the second downlink information.
Optionally, before determining the time allocation pattern according to the second message from the first network device, a first message may be further sent to the first network device, where the first message is used to indicate transmission time information of the first downlink information.
In this embodiment, the terminal device may send a first message to the first network device with the first user identity. The first network device may return a transmission period indicating the first downlink information to the terminal device according to the transmission time information indicated by the first message. Therefore, the terminal device can determine the transmission time interval of the first downlink information according to the second message, and further receive the message sent by the second network device according to the transmission time interval of the first downlink information. Because the transmission time interval of the first downlink information is a time interval specially allocated for the first downlink information, the terminal device does not occupy the transceiver with the first user identity in the process of random access with the second user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of random access is improved.
Optionally, after sending the first message, the first message is sent again to the first network device after a first time interval elapses.
By setting the first time interval, the situation that the terminal device frequently sends the first message to the first network device in some scenes can be effectively avoided.
Optionally, the second message further comprises a valid time period of the first transmission period.
Optionally, the implementation process of determining the time allocation mode may be: and determining the time distribution mode according to the transmission time information.
That is, in the embodiment of the present application, the transmission period of the first downlink information may be allocated by the terminal device itself. Because the transmission time interval of the first downlink information is a time interval specially allocated for the first downlink information, the terminal device will not occupy the transceiver with the first user identity in the process of random access with the second user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of the random access can be improved. In addition, in the embodiment of the application, the terminal device directly determines the time allocation mode according to the transmission time information without sending the transmission time information to the network device for allocation, so that the inaccuracy of the network device allocation is avoided, the process of reporting the transmission time information by the terminal device is reduced, and the random access time delay is shortened.
Optionally, the transmission time information includes one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, an RRC response waiting duration, and a beam recovery duration;
the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
the contention resolution duration refers to an allowable waiting duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be adopted when the terminal equipment carries out random access in a non-competitive random access mode by the second user identity;
the RRC response waiting duration refers to an allowed waiting duration for the terminal device to wait for the second network device to return the RRC response message;
the beam recovery duration refers to a duration of random access allowed by the terminal device when performing beam recovery with the second user identity.
Optionally, the method further comprises: suspending or stopping a first radio link monitoring within a first time period, the first time period being a transmission time period of the first downlink information indicated by the time allocation pattern, the first radio link monitoring being performed by the terminal device with a first subscriber identity.
In the embodiment of the application, the terminal device suspends the method for monitoring the radio link and maintaining the uplink synchronization timing by using the first user identity in the transmission period of the first downlink information, so that the situation that the terminal device makes a misjudgment to cause the RRC reestablishment by using the first user identity again can be avoided, and the service communication is prevented from being influenced.
In a third aspect, an information interaction method is provided, which is applied to a terminal device, where the terminal device supports a first user identity and a second user identity, and the method includes: sending first information to a first network device by using the first user identity, wherein the first information is used for indicating that the terminal device suspends or stops receiving and/or sending signals by using the first user identity, and the first information is carried in a Media Access Control (MAC) layer control unit (MAC CE) or a physical layer (PHY) signal; pausing or stopping signaling and/or sending with the first user identity; and interacting with a second network device by using the second user identity.
Optionally, after interacting with the second network device with the second user identity, second information may be sent to the first network device with the first user identity, where the second information is used to notify the first network device that the signaling and/or sending with the first user identity is started.
Optionally, after interacting with a second network device with the second user identity, third information may also be sent to the second network device with the second user identity, where the third information is used to indicate that the signaling and/or sending with the second user identity is suspended or stopped; pausing or stopping the reception and/or transmission of signals with the second subscriber identity and starting the reception and/or transmission of signals with the first subscriber identity.
The terminal device may send the first information to the first network device in the first subscriber identity to suspend or stop information reception and/or transmission with the first network device. The terminal device may then interact with the second network device with the second user identity. And the terminal equipment can perform random access with the second user identity in the next time period. In the following time interval, the terminal device has already paused or stopped the signal receiving and/or transmitting with the first user identity, so that the terminal device will not occupy the receiver or the transmitter with the first user identity in the random access process with the second user identity, thus ensuring that the terminal device can receive or transmit messages in time with the second user identity, shortening the random access time delay and improving the success rate of the random access. In addition, in the embodiment of the present application, the MAC CE or PHY signal is used to notify the first network device to suspend the interaction with the terminal device, so that the terminal device may perform random access delay in a next period with the second user identity. Because the transmission speed of the MAC CE and PHY signals is higher, the time delay of random access can be shortened. It should be noted that, since the terminal device informs the first network device that the information transceiving with the first user identity is to be suspended or stopped, the first network device does not blindly schedule resources for the terminal device, thereby avoiding resource waste.
In a fourth aspect, a communication device is provided, which is configured to perform the method of the first aspect or any possible implementation manner of the first aspect, and in particular, the communication device may include means, such as a receiving means and a sending means, for performing the method of the first aspect or any possible implementation manner of the first aspect. Illustratively, the communication device is a communication device, or a chip or other component provided in the communication device. Illustratively, the communication device is a network device. In the following, the communication device is taken as an example of a network device.
A receiving module, configured to receive a first message sent by a terminal device with a first user identity, where the first message is used to indicate transmission time information of first downlink information, and the first downlink information is information received by the terminal device with a second user identity in a random access process.
A sending module, configured to send a second message to the terminal device according to the first message, where the second message is used to indicate a transmission time period of the first downlink information.
Optionally, the transmission time information includes one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, a radio resource control RRC response waiting duration, and a beam recovery duration;
the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
the contention resolution duration refers to a duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be used when the terminal equipment carries out random access in a non-competitive random access mode through the second user identity;
the RRC response waiting time length refers to the time length for the terminal equipment to wait for the second network equipment to return the RRC response message;
the beam recovery duration refers to a duration of random access of the terminal device with the second user identity when performing beam recovery.
Optionally, the sending module is specifically configured to:
determining uplink time domain resources and downlink time domain resources used by the terminal equipment with a first user identity;
and sending the second message to the terminal equipment according to the transmission time information and at least one of the uplink time domain resource and the downlink time domain resource.
Optionally, the second message is configured to indicate a first transmission time period and/or a second transmission time period, where the first transmission time period is a transmission time period of the first downlink information, the second transmission time period is a transmission time period of the second downlink information, and the second downlink information refers to information received by the terminal device with the first subscriber identity.
Optionally, the second message further comprises a valid time period of the first transmission period.
With regard to the technical effects of the fourth aspect or of various possible embodiments of the fourth aspect, reference may be made to the introduction to the technical effects of the respective embodiments of the first aspect or of the first aspect.
In a fifth aspect, a communication device is provided, which is configured to perform the method of the second aspect or any possible implementation manner of the second aspect, and in particular, the communication device may include modules, such as a receiving module, a sending module, and a processing module, configured to perform the method of the second aspect or any possible implementation manner of the second aspect. Illustratively, the communication device is a communication device, or a chip or other component provided in a communication device. Illustratively, the communication device is a terminal device. In the following, the communication apparatus is exemplified as a terminal device. The terminal equipment supports a first user identity and a second user identity;
the processing module is configured to determine a time allocation mode, where the time allocation mode is used to indicate a transmission time period of first downlink information and/or second downlink information, where the first downlink information is information received by a terminal device in a random access process with the second user identity, and the second downlink information is information received by the terminal device in a random access process with the first user identity;
the receiving module is configured to receive the first downlink information according to the time allocation mode.
Optionally, the processing module is specifically configured to: determining the time allocation pattern according to a second message from a first network device, the second message indicating a first transmission period and/or a second transmission period, the first transmission period being a transmission period of the first downlink information, the second transmission period being a transmission period of the second downlink information.
Optionally, the sending module is configured to send a first message to the first network device, where the first message is used to indicate transmission time information of the first downlink information.
Optionally, the sending module is further configured to:
after sending the first message, sending the first message to the first network device again after a first time interval.
Optionally, the second message further comprises a valid time period of the first transmission period.
Optionally, the processing module is specifically configured to: and determining the time distribution mode according to the transmission time information.
Optionally, the transmission time information includes one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, an RRC response waiting duration, and a beam recovery duration;
the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
the contention resolution duration refers to an allowable waiting duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be adopted when the terminal equipment carries out random access in a non-competitive random access mode by the second user identity;
the RRC response waiting duration refers to an allowed waiting duration for the terminal device to wait for the second network device to return the RRC response message;
the beam recovery duration refers to a duration of random access allowed by the terminal device when performing beam recovery with the second user identity.
Optionally, the processing module is further configured to: suspending or stopping a first radio link monitoring within a first time period, the first time period being a transmission time period of the first downlink information indicated by the time allocation pattern, the first radio link monitoring being performed by the terminal device with a first subscriber identity.
With regard to the technical effects of the fifth aspect or of the various possible embodiments of the fifth aspect, reference may be made to the introduction of the technical effects of the respective embodiments of the second aspect or of the second aspect.
In a sixth aspect, a communication device is provided, which is configured to perform the method in any of the foregoing third aspect or any possible implementation manner of the third aspect, and in particular, the communication device may include means, such as a transceiver module and a processing module, for performing the method in any of the third aspect or any possible implementation manner of the third aspect. Illustratively, the communication device is a communication device, or a chip or other component provided in a communication device. Illustratively, the communication device is a terminal device. In the following, the communication apparatus is exemplified as a terminal device. The terminal equipment supports a first user identity and a second user identity;
the receiving and sending module is used for sending first information to the first network equipment by using the first user identity, wherein the first information is used for indicating the terminal equipment to suspend or stop receiving and sending signals by using the first user identity;
the processing module is used for pausing or stopping signal receiving and/or sending with the first user identity;
the transceiver module is further configured to interact with a second network device with a second user identity.
Optionally, the transceiver module is further configured to: and sending second information to the first network equipment by using the first user identity, wherein the second information is used for informing the first network equipment that the signal receiving and/or sending with the first user identity is started.
Optionally, the transceiver module is further configured to: sending third information to the second network equipment by using the second user identity, wherein the third information is used for indicating that the signal receiving and/or sending are/is stopped by using the second user identity; the processing module is also used for suspending or stopping signal receiving and/or sending with the second user identity and starting signal receiving and/or sending with the first user identity.
With regard to the technical effects of the sixth aspect or of various possible embodiments of the sixth aspect, reference may be made to the introduction to the technical effects of the respective embodiments of the third aspect or of the third aspect.
In a seventh aspect, a communications apparatus is provided. The communication device includes a processor. Optionally, a transceiver may also be included. The processor and the transceiver are mutually coupled for implementing the method as described in the first aspect or the various possible embodiments of the first aspect. Optionally, the communication device may further comprise a memory. The processor, the memory and the transceiver are mutually coupled for implementing the method as described in the first aspect or the various possible embodiments of the first aspect. Illustratively, the communication device is a communication device, or a chip or other component provided in a communication device. Illustratively, the communication device is a network device. In the following, the communication device is taken as an example of a network device. Wherein, if the communication device is a communication device, the transceiver is implemented by an antenna, a feeder, a codec, etc. in the communication device, for example. Alternatively, if the communication device is a chip disposed in the communication device, the transceiver is, for example, a communication interface in the chip, and the communication interface is connected to a radio frequency transceiver component in the communication device to implement transceiving of information through the radio frequency transceiver component. Wherein the content of the first and second substances,
the transceiver is configured to receive a first message sent by a terminal device with a first user identity, where the first message is used to indicate transmission time information of first downlink information, and the first downlink information is information received by the terminal device with a second user identity in a random access process; and sending a second message to the terminal equipment according to the first message, wherein the second message is used for indicating the transmission time interval of the first downlink information.
Optionally, the transmission time information includes one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, a radio resource control RRC response waiting duration, and a beam recovery duration;
the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
the contention resolution duration refers to a duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be used when the terminal equipment carries out random access in a non-competitive random access mode through the second user identity;
the RRC response waiting time length refers to the time length for the terminal equipment to wait for the second network equipment to return the RRC response message;
the beam recovery duration refers to a duration of random access of the terminal device with the second user identity when performing beam recovery.
Optionally, the processor is configured to determine an uplink time domain resource and a downlink time domain resource used by the terminal device with a first user identity; the transceiver is configured to send the second message to the terminal device according to the transmission time information and at least one of the uplink time domain resource and the downlink time domain resource.
Optionally, the second message is configured to indicate a first transmission time period and/or a second transmission time period, where the first transmission time period is a transmission time period of the first downlink information, the second transmission time period is a transmission time period of the second downlink information, and the second downlink information refers to information received by the terminal device with the first subscriber identity.
Optionally, the second message further comprises a valid time period of the first transmission period.
With regard to technical effects of the seventh aspect or of various possible embodiments of the seventh aspect, reference may be made to the introduction to the first aspect or to the technical effects of the respective embodiments of the first aspect.
In an eighth aspect, a communication device is provided. The communication device includes a processor. Optionally, a transceiver may also be included. The processor and the transceiver are coupled to each other for implementing the method as described in the second aspect or in the various possible embodiments of the second aspect. Optionally, the communication device may further comprise a memory. The processor, the memory and the transceiver are coupled to each other for implementing the method as described in the second aspect or in the various possible embodiments of the second aspect. Illustratively, the communication device is a communication device, or a chip or other component provided in a communication device. Illustratively, the communication device is a terminal device. In the following, the communication apparatus is exemplified as a terminal device. Wherein, if the communication device is a terminal device, the transceiver is implemented by an antenna, a feeder, a codec, etc. in the communication device, for example. Alternatively, if the communication device is a chip disposed in the communication device, the transceiver is, for example, a communication interface in the chip, and the communication interface is connected to a radio frequency transceiver component in the communication device to implement transceiving of information through the radio frequency transceiver component. Wherein the content of the first and second substances,
the processor is configured to determine a time allocation mode, where the time allocation mode is used to indicate a transmission time period of first downlink information and/or second downlink information, where the first downlink information is information received by a terminal device in a random access process with the second user identity, and the second downlink information is information received by the terminal device in a random access process with the first user identity;
the transceiver is configured to receive the first downlink information according to the time allocation pattern.
Optionally, the processor is specifically configured to:
determining the time allocation pattern according to a second message from a first network device, the second message indicating a first transmission period and/or a second transmission period, the first transmission period being a transmission period of the first downlink information, the second transmission period being a transmission period of the second downlink information.
Optionally, the transceiver is configured to send a first message to the first network device, where the first message is used to indicate transmission time information of the first downlink information.
Optionally, the transceiver is further configured to: after sending the first message, sending the first message to the first network device again after a first time interval.
Optionally, the second message further comprises a valid time period of the first transmission period.
Optionally, the processor is specifically configured to: and determining the time distribution mode according to the transmission time information.
Optionally, the transmission time information includes one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, an RRC response waiting duration, and a beam recovery duration;
the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
the contention resolution duration refers to an allowable waiting duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be adopted when the terminal equipment carries out random access in a non-competitive random access mode by the second user identity;
the RRC response waiting duration refers to an allowed waiting duration for the terminal device to wait for the second network device to return the RRC response message;
the beam recovery duration refers to a duration of random access allowed by the terminal device when performing beam recovery with the second user identity.
Optionally, the processor is further configured to: suspending or stopping first radio link monitoring within a first time period, the first time period being a transmission time period of the first downlink information indicated by the time allocation pattern, the first radio link monitoring being performed by the terminal device with a first subscriber identity.
With regard to the technical effects of the eighth aspect or of various possible embodiments of the eighth aspect, reference may be made to the introduction to the technical effects of the second aspect or of the respective embodiments of the second aspect.
In a ninth aspect, a communication device is provided. The communication device includes a processor. Optionally, a transceiver may also be included. The processor and the transceiver are coupled to each other for implementing the methods described in the third aspect or the various possible embodiments of the third aspect. Optionally, the communication device may further comprise a memory. The processor, the memory and the transceiver are coupled to each other for implementing the methods described in the third aspect or the various possible embodiments of the third aspect. Illustratively, the communication device is a communication device, or a chip or other component provided in a communication device. Illustratively, the communication device is a terminal device. In the following, the communication apparatus is exemplified as a terminal device. Wherein, if the communication device is a terminal device, the transceiver is implemented by an antenna, a feeder, a codec, etc. in the communication device, for example. Alternatively, if the communication device is a chip disposed in the communication device, the transceiver is, for example, a communication interface in the chip, and the communication interface is connected to a radio frequency transceiver component in the communication device to implement transceiving of information through the radio frequency transceiver component. Wherein the content of the first and second substances,
the transceiver is used for sending first information to the first network equipment by using the first user identity, wherein the first information is used for indicating the terminal equipment to suspend or stop receiving and sending signals by using the first user identity;
a processor for suspending or stopping the transmission and/or reception of signals with the first user identity;
the transceiver is further configured to interact with a second network device with a second user identity.
Optionally, the transceiver is further configured to: and sending second information to the first network equipment by using the first user identity, wherein the second information is used for informing the first network equipment that the signal receiving and/or sending with the first user identity is started.
Optionally, the transceiver is further configured to: sending third information to the second network equipment by using the second user identity, wherein the third information is used for indicating that the signal receiving and/or sending are/is stopped by using the second user identity; the processing module is also used for suspending or stopping signal receiving and/or sending with the second user identity and starting signal receiving and/or sending with the first user identity.
With regard to the technical effects of the various possible embodiments of the ninth aspect or the ninth aspect, reference may be made to the introduction to the technical effects of the respective embodiments of the third aspect or the third aspect.
A tenth aspect provides a computer-readable storage medium, which stores instructions that, when executed on a computer, cause the computer to perform the random access method of the first aspect or the second aspect, or cause the computer to perform the information interaction method of the third aspect.
In an eleventh aspect, there is provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the random access method of the first or second aspect, or cause the computer to perform the information interaction method of the third aspect.
The technical effects obtained by the tenth and eleventh aspects described above are similar to those obtained by the corresponding technical means in the first, second, and third aspects. And will not be described in detail herein.
The beneficial effect that technical scheme that this application provided brought includes at least:
in this embodiment, the terminal device may send a first message to the first network device with the first user identity. The first network device may return a transmission period indicating the first downlink information to the terminal device according to the transmission time information indicated by the first message. Therefore, the terminal device can determine the transmission time interval of the first downlink information according to the second message, and further receive the message sent by the second network device according to the transmission time interval of the first downlink information. Because the transmission time interval of the first downlink information is a time interval specially allocated for the first downlink information, the terminal device will not occupy the transceiver with the first user identity in the process of random access with the second user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of the random access can be improved.
Drawings
Fig. 1 is a schematic structural diagram of a terminal device provided in an embodiment of the present application;
fig. 2 is a schematic structural diagram of a network device according to an embodiment of the present application;
fig. 3 is a system architecture diagram according to a random access method provided in an embodiment of the present application;
fig. 4 is an architecture diagram of a network device according to an embodiment of the present application;
fig. 5 is a flowchart of a random access method provided in the related art;
fig. 6 is a flowchart of a random access method provided in an embodiment of the present application;
fig. 7 is a flowchart of another random access method provided in an embodiment of the present application;
FIG. 8 is a flowchart of an information interaction method provided in an embodiment of the present application;
fig. 9 is a schematic structural diagram of a random access apparatus according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of another random access apparatus provided in an embodiment of the present application;
fig. 11 is a schematic structural diagram of an information interaction device according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Hereinafter, some terms in the embodiments of the present application are explained to facilitate understanding by those skilled in the art.
1) Terminal equipment, including equipment providing voice and/or data connectivity to a user, in particular, including equipment providing voice to a user, or including equipment providing data connectivity to a user, or including equipment providing voice and data connectivity to a user. For example, may include a handheld device having wireless connection capability, or a processing device connected to a wireless modem. The terminal device may communicate with a core network via a Radio Access Network (RAN), exchange voice or data with the RAN, or interact with the RAN. The terminal device may include a User Equipment (UE), a wireless terminal device, a mobile terminal device, a device-to-device communication (D2D) terminal device, a vehicle-to-all (V2X) terminal device, a machine-to-machine/machine-type communication (M2M/MTC) terminal device, an internet of things (internet of things) terminal device, a subscriber unit (subscriber unit), a subscriber station (subscriber station), a mobile station (mobile station), a remote station (remote station), an access point (access point, AP), a remote terminal (remote), an access terminal (access terminal), a user terminal (user terminal), a user agent (user), or user equipment (user), etc. For example, mobile telephones (or so-called "cellular" telephones), computers with mobile terminal equipment, portable, pocket, hand-held, computer-included mobile devices, and the like may be included. For example, Personal Communication Service (PCS) phones, cordless phones, Session Initiation Protocol (SIP) phones, Wireless Local Loop (WLL) stations, Personal Digital Assistants (PDAs), and the like. Also included are constrained devices, such as devices that consume less power, or devices that have limited storage capabilities, or devices that have limited computing capabilities, etc. Examples of information sensing devices include bar codes, Radio Frequency Identification (RFID), sensors, Global Positioning Systems (GPS), laser scanners, and the like.
By way of example and not limitation, in the embodiments of the present application, the terminal device may also be a wearable device. Wearable equipment can also be called wearable smart device or intelligent wearable equipment etc. is the general term of using wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets, smart helmets, smart jewelry and the like for monitoring physical signs.
The various terminal devices described above, if located on a vehicle (e.g., placed in or installed in the vehicle), may be considered to be vehicle-mounted terminal devices, which are also referred to as on-board units (OBUs), for example.
In this embodiment, the terminal device may further include a relay (relay). Or, it is understood that any device capable of data communication with a base station may be considered a terminal device.
In the embodiment of the present application, the apparatus for implementing the function of the terminal device may be the terminal device, or may be an apparatus capable of supporting the terminal device to implement the function, for example, a chip system, and the apparatus may be installed in the terminal device. In the embodiment of the present application, the chip system may be composed of a chip, and may also include a chip and other discrete devices. In the technical solution provided in the embodiment of the present application, a device for implementing a function of a terminal is taken as an example of a terminal device, and the technical solution provided in the embodiment of the present application is described.
Fig. 1 is a schematic structural diagram of a terminal device according to an embodiment of the present application. Referring to fig. 1, the terminal device may include a processor, a communication interface, one or more connection circuit modules, and a memory. It should be noted that the device structure shown in fig. 1 does not constitute a limitation of the terminal device, and may include more or less components than those shown in the drawings, or combine some components, or arrange different components, which is not limited in the embodiments of the present application. The following specifically describes each constituent component of the terminal device with reference to fig. 1:
the processor may include circuitry for audio/video and logic functions of the terminal device. For example, a processor may be comprised of a digital signal processor device, a microprocessor device, an analog to digital converter, a digital to analog converter, and so forth. The control and signal processing functions of the mobile device may be allocated between these devices according to their respective capabilities. The processor may also include an internal voice coder VC, an internal data modem DM, and the like. Further, the processor may include functionality to operate one or more software programs, which may be stored in the memory. In general, the processor and stored software instructions may be configured to cause the terminal device to perform actions. For example, the processor and stored software instructions may be configured to perform the actions performed by the terminal device in the embodiments illustrated in FIGS. 6-8.
The terminal device may also include a user interface, which may include, for example, an earphone or speaker, a microphone, an output device (e.g., a display), an input device, and/or the like, operatively coupled to the processor. In this regard, the processor may include user interface circuitry configured to control at least some functions of one or more elements of the user interface (such as a speaker, microphone, display, etc.). The processor and/or user interface circuitry comprising the processor may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (e.g., software and/or firmware) stored in a memory accessible to the processor. Although not shown, the terminal device may include a battery for powering various circuits associated with the mobile device, such as circuits that provide mechanical vibration as a detectable output. The input means may comprise a device allowing the apparatus to receive data, such as a keypad, a touch display, a joystick and/or at least one other input device, etc.
The terminal device may also include one or more connection circuit modules for sharing and/or obtaining data. For example, the terminal device may include a short-range Radio Frequency (RF) transceiver and/or detector so that data may be shared with and/or obtained from the electronic device in accordance with RF techniques. The terminal device may include other short range transceivers such as, for example, an infrared IR transceiver, a usage transceiver, a wireless universal serial bus USB transceiver, and so forth. The bluetooth transceiver is capable of operating in accordance with bluetooth low energy or ultra low energy technology. In this regard, the terminal device, and more particularly the short-range transceiver, is capable of transmitting and/or receiving data to and/or from electronic devices in the vicinity of the apparatus (such as within 10 meters). Although not shown, the terminal device can transmit and/or receive data to and/or from the electronic device according to various wireless networking techniques, including Wi-Fi, Wi-Fi low power, WLAN techniques such as IEEE 802.11 techniques, IEEE 802.15 techniques, IEEE 802.16 techniques, and/or the like.
The terminal equipment may comprise a memory, such as a subscriber identity module SIM, which may store information elements related to the mobile subscriber. In addition to the SIM, the apparatus may also include other removable and/or fixed memory. The terminal device may include volatile memory and/or non-volatile memory. For example, volatile memory can include Random Access Memory (RAM), including dynamic RAM and/or static RAM, on-chip and/or off-chip cache memory, and the like. Non-volatile memory, which may be embedded and/or removable, may include, for example, read-only memory, flash memory, magnetic storage devices, such as hard disks, floppy disk drives, magnetic tape, etc., optical disk drives and/or media, non-volatile random access memory NVRAM, etc. Similar to volatile memory, non-volatile memory may include a cache area for temporary storage of data. At least a portion of the volatile and/or nonvolatile memory may be embedded in the processor. The memories may store one or more software programs, instructions, blocks of information, data, and the like, which may be used by the terminal device to perform the functions of the mobile terminal. For example, the actions of the terminal device in the embodiments shown in fig. 6-8 may be performed by the processor invoking software programs, instructions, blocks of information, data, etc. in the memory. In particular, the memories may comprise an identifier, such as the international mobile equipment identity, IMEI code, capable of uniquely identifying the terminal device, and may store an international mobile subscriber identity, IMSI, or the like.
2) Network devices, including, for example, Access Network (AN) devices, such as base stations (e.g., access points), may refer to devices in AN access network that communicate with wireless terminal devices over one or more cells over the air, or, for example, a network device in vehicle-to-all (V2X) technology is a Road Side Unit (RSU). The base station may be configured to interconvert received air frames and IP packets as a router between the terminal device and the rest of the access network, which may include an IP network. The RSU may be a fixed infrastructure entity supporting the V2X application and may exchange messages with other entities supporting the V2X application. The network device may also coordinate attribute management for the air interface. For example, the network device may include an evolved Node B (NodeB or eNB or e-NodeB) in a Long Term Evolution (LTE) system or an advanced long term evolution (LTE-a), or may also include a next generation Node B (gNB) in a New Radio (NR) system (also referred to as an NR system) of a fifth generation mobile communication technology (5G), or may also include a Centralized Unit (CU) and a Distributed Unit (DU) in a Cloud RAN network (Cloud RAN) system, which is not limited in the embodiments of the present application.
The network device may also include a core network device including, for example, an access and mobility management function (AMF), etc.
In the embodiment of the present application, the apparatus for implementing the function of the network device may be a network device, or may be an apparatus capable of supporting the network device to implement the function, for example, a system on chip, and the apparatus may be installed in the network device. In the technical solution provided in the embodiment of the present application, a device for implementing a function of a network device is taken as an example of a network device, and the technical solution provided in the embodiment of the present application is described.
Fig. 2 is a schematic structural diagram of a network device according to an embodiment of the present application. As shown in fig. 2, the network device may include at least one processor 201, a communication bus 202, a memory 203, and at least one communication interface 204. It should be noted that the device structure shown in fig. 2 does not constitute a limitation on the network function node, and may include more or less components than those shown in the drawings, or combine some components, or arrange different components, which is not limited in the embodiment of the present application. The following describes each component of the network device in detail with reference to fig. 2:
the processor 201 is a control center of the network device, and may be a processor or a collective term for a plurality of processing elements. For example, the processor 201 may be a general-purpose Central Processing Unit (CPU), an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of programs according to the present disclosure, such as: one or more microprocessors (digital signal processors, DSPs), or one or more Field Programmable Gate Arrays (FPGAs). The processor 201 may perform various functions of the network function node by running or executing software programs stored in the memory 203, and calling data stored in the memory 203, among others. For example, the actions of the first network device or the second network device in the embodiments shown in fig. 6-8 may be performed by the processor of the respective network device invoking data in the memory.
In particular implementations, processor 201 may include one or more CPUs, such as CPU0 and CPU1 shown in fig. 2, as one embodiment.
In particular implementations, a network function node may include multiple processors, such as processor 201 and processor 205 shown in fig. 2, as an example. Each of these processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The communication bus 202 may include a path that conveys information between the aforementioned components. The communication bus 202 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 2, but that does not indicate only one bus or one type of bus.
The Memory 203 may be a Read-Only Memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these. The memory 203 may be self-contained and coupled to the processor 201 via the communication bus 202. The memory 203 may also be integrated with the processor 201. The memory 203 is used for storing a software program for executing the scheme provided by the embodiment of the application, and is controlled by the processor 201 to execute.
Communication interface 204 is used for communicating with other devices or communication networks, such as ethernet, RAN, Wireless Local Area Networks (WLAN), etc. The communication interface 33 may include a receiving unit implementing a receiving function and a transmitting unit implementing a transmitting function.
In one embodiment, the network device may further include an output device 206 and an input device 207. The output device 206 is in communication with the processor 201 and may display information in a variety of ways. For example, the output device 206 may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display device, a Cathode Ray Tube (CRT) display device, a projector (projector), or the like. The input device 207 is in communication with the processor 201 and may receive user input in a variety of ways. For example, the input device 207 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
The network function node may be a general-purpose network device or a special-purpose network device. In particular implementations, it may be a desktop, laptop, web server, or the like.
3) In the embodiment of the present application, a "user identity" (e.g., a first user identity or a second user identity, etc.) is a logical concept. For example, the "subscriber identity" may correspond to a SIM card or subscriber information or a virtual SIM card or subscriber identity (e.g., International Mobile Subscriber Identity (IMSI) or Temporary Mobile Subscriber Identity (TMSI), etc.). From the perspective of the network side, different "user identities" logically correspond to different communication entities served by the network side, such as UEs in 4G and 5G systems, for example, a terminal device supporting two user identities, which can be regarded as two communication entities for the network side. For another example, when the "user identity" corresponds to the SIM card or the subscriber information, the network side may identify two terminal devices supporting different SIM cards or different subscriber information as two different communication entities, and may also identify the same terminal device supporting multiple different SIM cards or multiple subscriber information as multiple different communication entities, even though in practice, the terminal device supporting multiple different SIM cards or multiple subscriber information is only one physical entity. In the embodiment of the present application, a SIM card corresponding to a "subscriber identity" is mainly taken as an example for description.
For example, the SIM card may be understood as a key for the terminal device to access a mobile network, and for convenience of description, the SIM card and its evolution are collectively referred to as the SIM card in the embodiments of the present application. For example, the SIM card may be an identification card of a global system for mobile communications (GSM) digital mobile phone user, which is used for storing an identification code and a secret key of the user and supporting authentication of the GSM system to the user; for another example, the SIM card may be a Universal Subscriber Identity Module (USIM), which may also be referred to as an upgraded SIM card.
In the following, it is considered that the terminal device supports one subscriber identity by installing one SIM card, for example, the terminal device installing two SIM cards can support two subscriber identities, and it can be understood that the SIM cards and the subscriber identities are in a one-to-one correspondence relationship. The present disclosure mainly takes an example that a terminal device supports two user identities, which are referred to as a first user identity and a second user identity respectively. The first user identity may be understood as a user identity which the terminal device has after the SIM card 1 is installed, and the second user identity may be understood as a user identity which the terminal device has after the SIM card 2 is installed. In other possible embodiments, if the terminal device has more than two SIM cards, the terminal device may also support more than two subscriber identities, for example, the terminal device supports three subscriber identities, four subscriber identities or more subscriber identities, and may be registered in more than two networks, where each subscriber identity may be registered in one network. The embodiment of the present application will be described mainly based on that the terminal device supports two user identities, and when the terminal device supports more than two user identities, the specific implementation thereof may refer to the description that the terminal device supports two user identities, and some simple adaptations may need to be made, but the embodiment of the present application is also within the protection scope of the embodiment of the present application.
When the user identity of the terminal device is the first user identity, the terminal device may be understood as a user from the perspective of the network device (from the perspective of the protocol, the terminal device is, for example, referred to as the first user); when the user identity of the terminal device is the second user identity, the terminal device may be understood as a further user (e.g. referred to as the second user) from the point of view of the network device. The terminal device may be registered with the first network with a first subscriber identity and with the second network with a second subscriber identity. In the embodiment of the present application, the terminal device supports one user identity, which can also be described as that the terminal device has one user identity. Similarly, the terminal device supports two user identities, which can also be described as the terminal device having two user identities.
4) Radio Resource Control (RRC) states, a terminal device has 3 RRC states: RRC connected state (connected state), RRC idle state (idle state), and inactive state (inactive state).
Herein, "connected state" and "RRC connected state" are the same concept, and the two designations may be interchanged): the terminal device establishes RRC connection with the network and can perform data transmission.
Herein, "idle state" and "RRC idle state" are the same concept, and the two designations may be interchanged): the terminal device does not establish an RRC connection with the network and the base station does not store the context of the terminal device. If the terminal device needs to enter the RRC connected state from the RRC idle state, an RRC connection establishment procedure needs to be initiated.
Herein, "deactivated dynamic," "deactivated," "inactive," "RRC inactive," and "RRC deactivated" are the same concept, and these designations may be interchanged): the terminal device has previously entered the RRC connected state and the base station then releases the RRC connection, but the base station maintains the context of the terminal device. If the terminal device needs to re-enter the RRC connected state from the RRC inactive state, an RRC connection recovery procedure (alternatively referred to as an RRC connection re-establishment procedure) needs to be initiated. Compared with the RRC establishment process, the RRC recovery process has shorter time delay and smaller signaling overhead. However, the base station needs to store the context of the terminal device, which occupies the storage overhead of the base station.
Before the embodiments of the present application are explained in detail, application scenarios related to the embodiments of the present application will be described.
Currently, many terminal devices support two user identities. When the terminal device includes a transceiver, the terminal device may share the transceiver with two user identities to perform information transceiving. When the terminal device occupies the transceiver with one user identity for information transceiving, the terminal device cannot perform information transceiving with another user identity. That is, with one transceiver, the terminal device can only transmit and receive information with one user identity at any time. In this case, if the current terminal device has already accessed the network device with the first subscriber identity but has not accessed the network device with the second subscriber identity, when accessing the network device with the second subscriber identity, the information transceiving with the second subscriber identity will be affected by the information transceiving with the first subscriber identity during the access process, which may result in a long access delay or an access failure. Based on this, the embodiment of the present application provides a random access method, which may allocate corresponding time periods to a first user identity and a second user identity, and a terminal device may perform information transceiving with the corresponding user identities in the corresponding time periods, so as to reduce a time delay when performing information transceiving with the second user identity, and improve a success rate of the terminal device accessing a network device with the second user identity.
The foregoing is one possible application scenario provided in the embodiment of the present application. Alternatively, in some cases, the terminal device may include two independent transceivers, and the terminal device may use the transceiver corresponding to each user identity to transceive information with each user identity. In this case, since there may be signal interference when the terminal device receives and transmits information with two user identities through two transceivers, respectively, a corresponding time period may be allocated to each user identity by the method provided in the embodiment of the present application. Therefore, the terminal equipment can receive and transmit information by the corresponding user identity in the time period corresponding to each user identity, and interference is avoided.
Fig. 3 is a system architecture diagram according to a random access method provided in an embodiment of the present application. As shown in fig. 3, the system includes a terminal device 301, a first network device 302, and a second network device 303. The terminal device 301 may communicate with the first network device 302 and the second network device 303. Optionally, communication may also be performed between the first network device 302 and the second network device 303, in some possible cases.
In this embodiment, the terminal device 301 may be the terminal device supporting two user identities described in the foregoing fig. 1. In the following embodiments, for convenience of description, the two user identities supported by the terminal device 301 are referred to as a first user identity and a second user identity, respectively. In addition, in this embodiment, the terminal device 301 may interact with the first network device 301 and the second network device 302 by using the method described in the following embodiment, so as to determine a transmission period for transmitting uplink and downlink information with each user identity.
The first network device 302 may refer to a network device corresponding to the first user identity in the terminal device 301. The first network device may be a base station serving a communication entity corresponding to the first subscriber identity. The terminal device 301 may perform information interaction with the first network device 302 in the first user identity. First network device 302 may implement scheduling for terminal device 301 through information interaction with terminal device 301. Wherein the first network device 302 may be implemented by the network device shown in fig. 2.
The second network device 303 may refer to a network device corresponding to the second user identity in the terminal device 301. The second network device may be a base station serving a communication entity corresponding to the second subscriber identity. The terminal device 301 may perform information interaction with the second network device 303 with the second user identity. The second network device 303 may in this way implement scheduling with the terminal device 301. Wherein the first network device 302 may be implemented by the network device shown in fig. 2.
It should be noted that the first network device 302 and the second network device 303 may be two network devices in the same network, or may be two network devices in different networks. Alternatively, the first network device 302 and the second network device 303 may be the same network device. The embodiments of the present application do not limit this.
In addition, in the embodiment of the present application, the first network device 302 and the second network device 303 may be 4G or 5G base stations. Also, the first network device 302 and the second network device may be base stations of a Centralized Unit (CU) and Distributed Unit (DU) split architecture. Fig. 4 shows a schematic structural diagram of a base station of a CU and DU separation architecture. As shown in fig. 4, the base station includes CU401 and DU 402.
The CU401 includes a central unit-control plane (CU-CP) 4011 of the central unit and a central unit-user plane (CU-UP) 4012 of the central unit. The CU-CP4011 and the CU-UP4012 communicate through an E1 interface. The CU-CP4011 is configured to implement a packet data convergence protocol (PDCP-C) function of an RRC and a control plane. The CU-UP4012 is used for realizing a Service Data Adaptation Protocol (SDAP) function and a packet data convergence protocol (PDCP-U) function of a user plane.
The DU402 may communicate with the CU-CP4011 through the F1-C interface and with the CU-UP4012 through the F1-U interface. DU402 is used to implement Radio Link Control (RLC), Medium Access Control (MAC), and physical layer (PHY) functions.
The following describes a procedure of performing random access by a terminal device.
Before establishing wireless connection with a network device, a terminal device needs to perform a random access process, wherein the random access process is as follows:
step 1: the terminal device sends a random access preamble to the network device.
The terminal device may obtain an available random access resource from a broadcast message of the network device, where the random access resource includes a time domain or frequency domain resource for sending random access and a corresponding random access preamble. When performing random access, the terminal device may obtain a random access preamble from the random access resource, and send the random access preamble to the network device.
After the terminal device sends the random access preamble, the random access response sent by the network device may be received within a time window.
Step 2: the network device sends a random access response to the terminal device.
The network device may learn that the terminal device currently wants access after receiving the random access preamble of the terminal device. In this case, the network device may estimate a transmission delay with the terminal device to perform uplink timing calibration, and transmit a random access response including calibration information to the terminal device. The purpose of uplink timing is to enable uplink information of each terminal device to reach the network device as simultaneously as possible, so as to avoid interference between each terminal device. The terminal device can maintain uplink synchronization with the network device according to the calibration information. In addition, the random access response may further include uplink resources subsequently used by the terminal device to transmit uplink information.
The terminal device may receive the random access response sent by the network device within a time window after sending the random access preamble. If the terminal device receives the random access response within the time window, the random access can be continued through the subsequent steps. If the random access response is not received in the time window, the terminal device may further determine whether the number of times of sending the random access preamble exceeds a maximum threshold, and if not, the terminal device may reselect a random access preamble and perform step 1. And if the number of times of sending the random access preamble exceeds the maximum threshold value, determining that the random access process fails.
And step 3: the terminal equipment sends a random access message.
If the terminal device receives the random access response within the time window, the terminal device may send a random access message according to the uplink resource included in the random access response. The random access message may be an RRC connection request (RRC connection request), and the random access message may include an identity of the terminal device, where the identity may be a flag from the core network for uniquely identifying the terminal device. Alternatively, a random number may be included in the random access message as the identity of the terminal device.
And 4, step 4: the network device performs contention resolution.
Because the network device may receive the random access messages sent by a plurality of different terminal devices at the same time, the network device may perform contention resolution after receiving the random access messages sent by the terminal devices. If the terminal device is successful in contention, the network device may transmit contention resolution information to the terminal device. The contention resolution information includes bit information included in a random access message previously sent by the terminal device (e.g., when the number of bits in the random access message exceeds 48 bits, the first 48 bits in the random access message are included, otherwise the entire random access message may be included).
The terminal device may start a contention resolution timer after sending the random access message. If the terminal device receives the contention resolution information sent by the network device within the time length defined by the contention resolution timer, the subsequent terminal device may interact with the network device to complete the establishment of the RRC connection. If the terminal device does not receive the contention resolution information within the time length defined by the contention resolution timer, the terminal device may determine that the contention resolution fails, at this time, the terminal device may further determine whether the number of times of sending the random access preamble exceeds the maximum threshold, if not, the terminal device may reselect a random access preamble, continue to execute step 1, and if the number of times of sending the random access preamble exceeds the maximum threshold, the terminal device determines that the random access process fails.
Fig. 5 is a flowchart of a random access method provided in the related art. As shown in fig. 5, when the first USIM in the terminal apparatus has completed random access and the second USIM needs to perform random access, the first USIM of the terminal apparatus may transmit a first message to the first network apparatus in the registration network of the first USIM. The first message includes random access resource information available when the second USIM accesses the second network equipment in the corresponding registration network. The first network device may send a second message to the first USIM after receiving the first message according to the first message, the second message including a first time unit within which the first network device does not interact with the first USIM. The second USIM may send a random access request (e.g., a random access preamble) to the second network device within the first time unit, and the second network device sends a random access response to the second USIM after receiving the random access request. After the second USIM receives the random access response, the first USIM may send a third message to the first network device, the third message including resource information available to the second USIM for sending a random access message (such as an RRC connection request message) next. The first network device may send a fourth message to the first USIM according to the third message, the fourth message including a second time unit within which the first network device does not interact with the first USIM. The second USIM may send a random access message to the second network device within the second time unit. After that, when the second USIM receives the contention resolution information sent by the second network device, the random access is completed.
Therefore, in the related art, the first network device only allocates uplink time of each random access procedure to two USIMs in the terminal device, but does not allocate corresponding downlink time to the two USIMs, so that the second USIM may not receive information sent by the second network device in time, which may result in an increase of random access delay, and even may result in a failure of random access. Based on this, the embodiment of the present application provides a random access method, which can shorten the random access time delay and provide a random access success rate.
Next, a random access method provided in an embodiment of the present application is described.
Fig. 6 is a flowchart of a random access method according to an embodiment of the present application. The method can be applied in the system shown in fig. 3, as shown in fig. 6, the method comprises the following steps:
step 601: the terminal equipment sends a first message to the first network equipment by using the first user identity, the first message is used for indicating the transmission time information of first downlink information, and the first downlink information refers to the information received by the terminal equipment in the random access process by using the second user identity.
The terminal device may be installed with two SIM cards, and sending the first message to the first network device by the terminal device with the first user identity may refer to sending the first message to the first network device by the terminal device through the first SIM card. Wherein the first SIM card supports a first subscriber identity. In addition, in the embodiment of the present application, the terminal device has already completed random access with the first user identity, but has not completed random access with the second user identity. The terminal device may be currently in an RRC connected state with the first user identity, and in any one of an RRC idle state, an RRC inactive state, or an RRC connected state with the second user identity.
It should be noted that the first message may include transmission time information. The transmission time information may include one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, a radio resource control, RRC, response waiting duration, and a beam recovery duration.
The random access response window refers to a time window in which the terminal device waits for the second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window.
In particular, if the terminal device is to randomly access the second network device with the second subscriber identity, the terminal device may first send a random access preamble to the second network device with the second subscriber identity. After sending the random access preamble, the terminal device may wait for a random access response returned by the second network device within a time window, where the random access response includes uplink resources and uplink timing for the terminal device to send the first uplink information to the second network device with the second user identity. The time window for waiting to receive the random access response is referred to as a random access response window. If the terminal device does not receive the random access response sent by the second network device in the random access response window, and the number of times that the terminal device sends the random access preamble to the second network device with the second subscriber identity has not reached the upper threshold, the terminal device may send the random access preamble to the second network device again with the second subscriber identity. If the terminal device does not receive the random access response sent by the second network device in the random access response window, and the number of times that the terminal device sends the random access preamble to the second network device by the second user identity has reached the upper threshold, the random access performed by the terminal device by the second user identity will fail. Therefore, if the terminal device occupies the random access response window with the first user identity, the random access delay of the terminal device with the second user identity may be increased, and even the access may be failed. Based on this, in the embodiment of the present application, the terminal device may send the random access response window to the first network device as the transmission time information, so that the first network device may perform time allocation according to the random access response window, so as to avoid that the terminal device occupies the random access response window with the first user identity.
The contention resolution duration refers to a duration for the terminal device to wait for the second network device to return the contention resolution information in the random access process.
Specifically, when the terminal device accesses the second network device with the second user identity, after receiving the random access response in the random access response window, the terminal device may send a random access message (such as an RRC connection establishment request message) to the second network device with the second user identity. The random access message includes the user identifier of the terminal device or a random number. After receiving the random access message, the second network device performs contention resolution and sends contention resolution information to the terminal device that wins the contention. The terminal device may start timing from the time when the random access message is transmitted, and determine that contention resolution fails if the contention resolution information is not received after a certain period of time. Subsequently, the terminal device re-initiates random access with the second user identity. The period of time for receiving the contention resolution information, which is counted from the time when the random access message is transmitted, is the contention resolution period.
The non-contention access resource configuration information includes a random access time domain resource which is allowed to be used when the terminal device performs random access in a non-contention random access mode by using the second user identity. For example, the non-contention access resource configuration information may include uplink time domain resources that may be used for sending a random access preamble when the terminal device performs non-contention random access with the second user identity. Besides, other available time domain resources and frequency domain resources may be included in the non-contention random access procedure.
The RRC response waiting duration refers to a duration for the terminal device to wait for the second network device to return the RRC response message. When the terminal device performs random access with the second user identity, the terminal device may send an RRC request, such as an RRC establishment request or an RRC activation request, to the second network device, and when the second network device receives the RRC request sent by the terminal device with the second user identity, the second network device may feed back an RRC response message to the terminal device. The terminal device may start timing from the time when the RRC request is transmitted, and wait for the RRC response message for a predetermined time period. The predetermined duration is the RRC response waiting duration. Optionally, in a possible case, when the transmission time information includes the RRC response waiting duration, the transmission time information may further include an indication information, and the indication information may be used to indicate whether the RRC response waiting duration is a corresponding RRC response waiting duration in the RRC establishment procedure or the RRC activation procedure. That is, the indication information may be used to indicate the type of the RRC request corresponding to the RRC response waiting duration.
The beam recovery duration refers to a duration of random access of the terminal device in the beam recovery with the second user identity. When the terminal device is in the RRC connected state with the second user identity, if the current beam fails, the terminal device may switch from the current beam to another beam, that is, perform beam recovery. When the terminal equipment is switched from one beam to another beam with the second user identity, the terminal equipment will perform the random access procedure again with the second user identity. The beam recovery duration refers to a duration of random access performed by the terminal device with the second subscriber identity due to beam recovery.
Alternatively, the transmission time information may include other information in addition to the above-mentioned items of information. For example, the transmission time information may further include a random access preamble, an uplink time domain resource, a frequency domain resource, and the like, which can be used by the terminal device with the second user equipment, or the transmission time information may further include a timing offset of the first network device and the second network device, and the like.
Optionally, in this embodiment of the present application, the first message may be an RRC message.
In addition, in some scenarios, the terminal device may frequently perform the random access procedure with the second subscriber identity. For example, the terminal device frequently performs beam recovery with the second subscriber identity, thereby triggering the terminal device to frequently perform random access with the second subscriber identity. Or, the terminal device fails to perform random access with the second user identity, so that the terminal device needs to initiate random access again with the second user identity. In the foregoing scenarios, in order to avoid that the terminal device frequently sends the first message to the first network device in the first subscriber identity, the terminal device may send the first message after a first time interval elapses after sending the first message once in the first subscriber identity. Specifically, the terminal device may start a timer from the time of sending the first message, the first message is not sent within a time defined by the timer, and the terminal device may send the first message again only after the length of the timer is reached. Wherein the length of the timer is equal to the first time interval. The value of the first time interval may be set by the terminal device, or may be notified by the first network device through an RRC message, or may be notified by the first network device or the second network device through a broadcast message. The embodiments of the present application do not limit this.
Step 602: and the first network equipment sends a second message to the terminal equipment according to the first message, wherein the second message is used for indicating the transmission time interval of the first downlink information.
After receiving the first message sent by the terminal device in the first user identity, the first network device may send a second message to the terminal device according to the transmission time information indicated by the first message. Wherein the first message is used for indicating a transmission period of the first downlink information.
Illustratively, the first network device may determine uplink time domain resources and downlink time domain resources used by the terminal device with the first subscriber identity. And then, sending a second message to the terminal equipment according to the transmission time information indicated by the first message and at least one of the uplink time domain resource and the downlink time domain resource.
The first network device is a network device corresponding to the first user identity in the terminal device, and can schedule information transceiving of the terminal device with the first user identity. Based on this, the first network device may allocate all uplink time domain resources and downlink time domain resources available to the terminal device in the first subscriber identity.
After determining the uplink time domain resources and the downlink time domain resources available to the terminal device with the first subscriber identity, in a possible implementation manner, the first network device may allocate a transmission period of the second downlink information to the terminal device from all available downlink time domain resources. The second downlink information refers to information sent by the first network device and received by the terminal device with the first user identity. After determining the transmission period of the second downlink information, the first network device may determine the transmission period of the first downlink information from a period other than the transmission period of the second downlink information according to the transmission time information.
Specifically, when the transmission time information includes a random response access window, the determined duration of the transmission period of the first downlink information is not less than the length of the random response window.
And when the transmission time information comprises the competition resolving duration, determining the transmission time interval of the first downlink information according to the competition resolving duration. The transmission time period of the first downlink information may include a plurality of discontinuous time periods, and the transmission time period of the first downlink information may ensure that the second subscriber identity can correctly receive the contention resolution information, for example, there is available downlink time for the second subscriber identity within a contention resolution duration after each time when the second subscriber identity can send an uplink.
When the transmission time information includes the two items of information, the transmission time period of the first downlink information determined according to the transmission time information also includes a plurality of discontinuous time periods, and the transmission time period of the first downlink information can ensure that the second user identity can correctly receive the contention resolution information, for example, there is available downlink time for the second user identity within the contention resolution time period after each time when the second user identity can send uplink.
When the transmission time information includes the non-contention access resource configuration information, the transmission period of the first downlink information does not coincide with the period in the random access uplink time domain resource included in the non-contention access resource configuration information. And, the transmission period of the first downlink information may be adjacent to one time period in the random access uplink time domain resource.
Optionally, when the transmission time information includes an RRC response waiting duration, determining a transmission period of the first downlink information according to the RRC response waiting duration, where the transmission period of the first downlink information may include multiple discontinuous periods, and the multiple discontinuous periods may ensure that the second subscriber identity can correctly receive the RRC response. For example, the second subscriber identity may have a downlink time available within the RRC response waiting duration after each time when the second subscriber identity can transmit uplink.
Alternatively, when the transmission time information includes two or three of the random access response window, the contention resolution duration, and the RRC response waiting duration, the transmission period of the first downlink information may be determined by combining the two or three information with reference to the foregoing method. At this time, the transmission period of the first downlink information includes a plurality of discontinuous periods, and the related constraints of the respective periods may refer to the foregoing description.
Optionally, when the transmission time information includes a beam recovery duration, the determined duration of the transmission period of the first downlink information is not less than the beam recovery duration.
After determining the transmission period of the first downlink information, the first network device may send a second message including the transmission period of the first downlink information to the terminal device. Alternatively, the first network device may send, to the terminal device, a second message including the transmission period of the first downlink information and the transmission period of the second downlink information.
Optionally, in another possible implementation manner, the first network device may also determine, according to the transmission time information, a transmission time period of the second downlink information from a downlink time domain resource available for the terminal device with the first user identity. Thereafter, the first network device may transmit a second message including a transmission period of the second downlink information to the terminal device. In this case, the other period except the transmission period of the second downlink information included in the second message is the transmission period of the first downlink information indicated by the second message. That is, the second message may indicate the transmission period of the first downlink information in an implicit manner.
Optionally, in another possible implementation manner, the first network device may select a time period from the uplink time domain resource available for the terminal device with the first subscriber identity as the transmission time period of the second uplink information. The second uplink information refers to information sent by the terminal device to the first network device in the first user identity. After determining the transmission period of the second uplink information, the first network device may determine the transmission period of the second downlink information according to the transmission period of the second uplink information. Thereafter, the first network device may select one period from among the transmission period of the second uplink information and the period other than the transmission period of the second downlink information as the transmission period of the first downlink information. Thereafter, the first network device may transmit a second message including the transmission period of the first downlink information to the terminal device. Alternatively, in this implementation, after determining the transmission period of the second uplink information and the transmission period of the second downlink information, the first network device may send, to the terminal device, a second message including the transmission period of the second uplink information and the transmission period of the second downlink information. In this way, the transmission period of the second uplink information and the period other than the transmission period of the second downlink information are the transmission period of the first downlink information indicated by the second message.
Optionally, in another possible implementation manner, the first network device may select a period from uplink time domain resources available for the terminal device with the first subscriber identity as a transmission period of the second uplink information, and select a period from downlink time domain resources available for the terminal device with the first subscriber identity as a transmission period of the second downlink information. After that, the first network device may select, according to the transmission time information, two periods from periods other than the transmission period of the second uplink information and the transmission period of the second downlink information as the transmission period of the first uplink information and the transmission period of the first downlink information, respectively. And the transmission time interval of the first uplink information and the transmission time interval of the first downlink information are not overlapped. Thereafter, the first network device may transmit a second message including the transmission period of the first uplink information and the transmission period of the first downlink information to the terminal device.
It should be noted that, in this embodiment, when the first network device is a base station of a CU and DU separation architecture, after receiving the first message, the CU-CP in the first network device may send transmission time information indicated by the first message to the DU, and the DU generates, by the above method, information that includes at least one of a transmission period of first uplink information, a transmission period of first downlink information, a transmission period of second uplink information, and a transmission time of second uplink information, and sends the information to the CU-CP. The CU-CP may transmit the transmission period included in the information to the terminal device in a second message.
Optionally, the second message may further include a valid period of the first transmission period. Wherein, the first transmission period refers to a transmission period of the first downlink information. The valid period refers to a period in which the first transmission period is valid. That is, the valid period may be used to indicate in which period the terminal device may use the first transmission period for information transceiving.
Step 603: the terminal equipment determines the time distribution mode according to the second message.
After receiving the second message sent by the first network device, the terminal device may acquire the transmission period included in the second message, and determine the time allocation mode according to the transmission period included in the second message. The time allocation mode is used for indicating a transmission period of the first downlink information and a transmission period of the second downlink information. It should be noted that, as can be seen from the foregoing description, the transmission period of the first downlink information may include a plurality of discontinuous periods, and similarly, the transmission period of the second downlink information may also include a plurality of discontinuous periods.
Optionally, when the transmission period included in the second message is the transmission period of the first downlink information, the terminal device may determine, according to the uplink time domain resource used by the terminal device with the first user identity and the uplink time domain resource used by the terminal device with the second user identity, the transmission period of the second downlink information, the transmission period of the second uplink information, and the transmission period of the first uplink information in combination with the transmission period of the first downlink information. The uplink time domain resource used by the terminal device with the first user identity may be notified to the terminal device by the first network device, and the uplink time domain resource used by the terminal device with the second user identity may be notified to the terminal device by the second network device.
Illustratively, the terminal device may select, as the transmission period of the first uplink information, a period that does not coincide with the transmission period of the first downlink information from the uplink time domain resources used with the second subscriber identity. Then, the terminal device may select, from the uplink time domain resource used with the first subscriber identity, a time period that does not coincide with the transmission time periods of the first downlink information and the first uplink information as the transmission time period of the second uplink information. Finally, the terminal device may determine the transmission period of the second downlink information from other periods except the transmission periods of the first uplink information, the first downlink information, and the second uplink information.
Optionally, when the second message includes a transmission period of the second downlink information, the terminal device may select, as the transmission period of the second uplink information, a period that does not coincide with the transmission period of the second downlink information from the uplink time domain resource used with the first subscriber identity. Then, the terminal device may determine the transmission time period of the first downlink information from the time periods other than the transmission time periods of the second uplink information and the second downlink information, and finally, the terminal device may select, as the transmission time period of the first uplink information, a time period that is not coincident with the three time periods from the uplink time domain resource used by the second user identity. Optionally, the terminal device may determine the transmission time period of the first uplink information from the uplink time domain resource used by the second user identity, and finally determine the transmission time period of the first downlink information when determining the transmission time periods of the second uplink information and the second downlink information. Similarly, the uplink time domain resource used by the terminal device with the first user identity may be notified to the terminal device by the first network device, and the uplink time domain resource used by the terminal device with the second user identity may be notified to the terminal device by the second network device.
Optionally, when the second message includes the transmission periods of the first downlink information and the second downlink information, the terminal device may determine the transmission period of the first uplink information and the transmission period of the second uplink information according to the transmission periods of the first downlink information and the second downlink information and the uplink time domain resource used by the terminal device with the first user identity and the second user identity, with reference to the foregoing method.
Optionally, when the second message includes the transmission periods of the second uplink information and the second downlink information, the terminal device may determine the transmission periods of the first downlink information and the first uplink information with reference to the foregoing case that the transmission period of the second downlink information is included in the second message. The embodiments of the present application are not described herein again.
It should be noted that the transmission period of the first uplink information and the transmission period of the first downlink information may constitute a continuous period. Similarly, the transmission period of the second uplink information and the transmission period of the second downlink information may constitute a continuous period. In addition, the transmission period of the first downlink information may include a plurality of sub-periods, the transmission period of the first uplink information may also include a plurality of sub-periods, and the plurality of sub-periods of the first downlink information and the plurality of sub-periods of the first uplink information are arranged to intersect.
Step 604: and the terminal equipment receives the first downlink information according to the time distribution mode.
After determining the time allocation mode, the terminal device may send a message to the second network device with the second user identity in the transmission period of the first uplink information according to the time allocation mode, and receive a message fed back by the second network device in the transmission period of the first downlink information. The transmission time interval of the first uplink information and the first downlink information is not overlapped with the transmission time interval of the second uplink information and the second downlink information. Therefore, when the terminal device interacts with the second network device for random access according to the transmission time interval of the first uplink information and the transmission time interval of the first downlink information with the second user identity, the terminal device suspends the interaction with the first network device with the first user identity. Therefore, the terminal equipment does not occupy the transceiver by the first user identity in the process of random access by the second user identity, so that the terminal equipment can be ensured to receive the information of the second network equipment in time, the random access time delay can be shortened, and the success rate of the random access is improved.
Optionally, in this embodiment of the application, after the terminal device completes the random access procedure with the second user identity according to the determined time allocation mode, the terminal device may further send a notification message to the first network device with the first user identity to notify the first network device that the terminal device has completed random access. Subsequently, the first network device may use another policy to reallocate the transmission time period for the first uplink information, the first downlink information, the second uplink information, and the second downlink information.
Optionally, when the terminal device is in the RRC connected state with the first subscriber identity, the terminal device needs to monitor the quality of the downlink signal transmitted with the first subscriber identity. If the downlink signal quality is continuously lower than a certain threshold, the physical layer of the terminal device reports a physical layer out-of-sync indication to the RRC layer. When the RRC layer continuously receives a certain number of physical layer out-of-sync indications, a timer is started. If the physical layer detects that the downlink signal quality is greater than a certain threshold, the physical layer may report a physical layer synchronization indication to the RRC. If the physical layer synchronization indication continuously received by the RRC is greater than a certain value within the time defined by the timer, the RRC layer cancels the timer, otherwise, the terminal device determines that the radio link established with the first user identity fails. In this case, the terminal device will reestablish the RRC connection with the first user identity. Reestablishing the RRC connection may affect traffic communication and may cause interruption of data.
Based on the above description, when the terminal device performs random access with the second user identity using the time allocation mode determined in the embodiment of the present application, in the transmission period of the first downlink information, the terminal device cannot monitor the quality of the downlink signal sent with the first user identity. At this time, the RRC layer of the terminal device starts a timer. And in the time length defined by the timer, because the terminal equipment is receiving the first downlink information with the second subscriber identity, it is difficult to receive a certain number of continuous physical layer synchronization indications in the time length defined by the timer. In this case, the terminal device will eventually decide that the radio link established with the first subscriber identity has failed. Based on this, in the embodiment of the present application, the terminal device may suspend or stop the wireless link monitoring with the first subscriber identity in the first time period, where the first time period refers to a transmission time period of the first downlink information. Specifically, the terminal device may suspend or stop monitoring the downlink signal quality with the first subscriber identity in the transmission period of the first downlink information, or the terminal device may also suspend or stop the operation of the timer after the timer is started.
Similarly, when the terminal device is in the RRC connected state with the first user identity, an uplink synchronization timer needs to be maintained. If the uplink synchronization timer is overtime, the uplink synchronization of the terminal equipment with the first user identity is out of synchronization, and thus, when the terminal equipment initiates uplink transmission with the first user identity, a random access process needs to be initiated again, which affects data communication of the terminal equipment with the first user identity.
When the terminal device performs random access with the second user identity in the time allocation mode determined by the embodiment of the present application, in a transmission period in which the terminal device performs information transmission with the second user identity, uplink desynchronization of the terminal device with the first user identity may be caused. Based on this, in the embodiment of the present application, the terminal device may also pause or stop running the uplink synchronization timer during the transmission period of information transmission with the second subscriber identity.
It should be noted that the method for the terminal device to suspend the radio link monitoring and the uplink synchronous timing maintenance performed by the first user identity within the transmission period of the first downlink information may be used not only in the random access process, but also in a scenario where the subsequent terminal device performs time division with the first user identity and the second user identity, that is, the method is not dependent on the random access method of the present application. In other scenarios, when the first user identity and the second user identity have corresponding transmission time periods, the terminal device may also suspend or stop the radio link monitoring and uplink synchronization timing maintenance performed with the second user identity within the time period of information transmission performed with the first user identity by using the above method. During the period of information transmission with the second user identity, the wireless link monitoring and uplink synchronization timing maintenance with the first user identity are suspended or stopped.
In this embodiment, the terminal device may send a first message to the first network device with the first user identity. The first network device may return a transmission period indicating the first downlink information to the terminal device according to the transmission time information indicated by the first message. Therefore, the terminal device can determine the transmission time interval of the first downlink information according to the second message, and further receive the message sent by the second network device according to the transmission time interval of the first downlink information. Because the transmission time interval of the first downlink information is a time interval specially allocated for the first downlink information, the terminal device will not occupy the transceiver with the first user identity in the process of random access with the second user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of the random access can be improved.
In the above embodiment, the terminal device may determine the time allocation mode according to the second message returned by the first network device, and then complete the random access procedure with the second user identity according to the time allocation mode. In an alternative implementation, the time allocation mode may also be determined by the terminal device itself according to the transmission time information. Referring to fig. 7, a flowchart of another random access method provided in the embodiment of the present application is shown. The method can be applied to the terminal equipment, and the method can comprise the following steps:
step 701: and determining a time allocation mode according to the transmission time information, wherein the time allocation mode is used for indicating the transmission time interval of the first downlink information and/or the second downlink information.
For a specific description of the transmission time information, reference may be made to the detailed description about the transmission time information in step 601 in the foregoing embodiment, and details of the embodiment of the present application are not described herein again.
In addition, the terminal device may determine the time allocation mode according to the transmission time information and at least one of an uplink time domain resource used by the terminal device with the first subscriber identity and a downlink time domain resource used by the terminal device with the second subscriber identity.
Illustratively, the terminal device may refer to step 602 in the foregoing embodiment, and determine the transmission period of the first downlink information according to the transmission time information and at least one of the uplink time domain resource used with the first subscriber identity and the downlink time domain resource used with the second subscriber identity, or determine the transmission period of the second downlink information, or determine the transmission periods of the first uplink information and the first downlink information, or determine the transmission periods of the second uplink information and the second downlink information.
After determining the time period, the terminal device may refer to step 603 in the foregoing embodiment, and determine the remaining undetermined time period according to the determined time period.
Step 702: the time allocation pattern is transmitted to the first network device.
After determining the time allocation mode, the terminal device may send the transmission time interval of the second uplink information and the second downlink information to the first network device, may also send the transmission time interval of the first uplink information and the first downlink information to the first network device, or may send the transmission time interval of the first downlink information and/or the second downlink information to the first network device. The first network device may perform uplink and downlink scheduling on the terminal device according to the received transmission time period.
It should be noted that, when the first network device is a base station of an architecture in which the CU and the DU are separated, the first network device may receive, through the CU-CP, a time allocation pattern sent by the terminal device, send the received information to the DU, and perform uplink and downlink scheduling on the terminal device by the DU according to the time allocation pattern.
Similarly, in order to avoid that the terminal device frequently sends the time allocation pattern to the first network device with the first subscriber identity, the terminal device may set a timer, starting from the time when the time allocation pattern is sent, and within a time duration defined by the timer, the terminal device does not send the time allocation pattern any more.
Step 703: first downlink information is received according to the time allocation pattern.
The terminal device may receive, in accordance with the transmission period of the first downlink information indicated by the time allocation pattern, a message fed back by the second network device in the random access process in the second subscriber identity. And, the terminal device may send a message to the second network device with the second subscriber identity in the transmission period of the first uplink information indicated by the time allocation pattern. When the terminal device interacts with the second network device in the transmission time interval of the first downlink information and the first uplink information with the second user identity, the terminal device suspends or stops the interaction with the first network device with the first user identity.
Optionally, in this embodiment of the application, after the terminal device completes the random access procedure with the second user identity according to the determined time allocation mode, the terminal device may further send a notification message to the first network device with the first user identity to notify the first network device that the terminal device has completed random access. Subsequently, the first network device may use another policy to reallocate the transmission time period for the first uplink information, the first downlink information, the second uplink information, and the second downlink information.
Optionally, in this embodiment of the present application, the terminal device may also suspend or stop the first radio link monitoring with the first subscriber identity and the maintenance of the uplink synchronization timer in the transmission period of the first downlink information. For a detailed implementation process, reference is made to related descriptions in the foregoing embodiments, and details of the embodiments of the present application are not described herein again.
In this embodiment of the application, the terminal device may determine a time allocation mode according to the transmission time information, and receive, in a first downlink transmission period indicated by the time allocation mode, a message fed back by the second network device in the random access process with the second user identity. Because the transmission time interval of the first downlink information is a time interval specially allocated for the first downlink information, the terminal device will not occupy the transceiver with the first user identity in the process of random access with the second user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of the random access can be improved. In addition, in the embodiment of the application, the terminal device directly determines the time allocation mode according to the transmission time information without sending the transmission time information to the network device for allocation, so that the inaccuracy of the network device allocation is avoided, the process of reporting the transmission time information by the terminal device is reduced, and the random access time delay is shortened.
When the terminal device interacts with the network device, the amount of information data in the message to be transmitted is large, and therefore, these pieces of information are usually carried by RRC messages. However, the transmission of RRC messages in radio transmission is usually slow, which results in a large delay. Especially when the network device is a base station of an architecture with separate CUs and DUs, in the random access process, after receiving the RRC message sent by the terminal device, the CU needs to send the RRC message to the DU, and the DU performs time allocation. Then, the DU transmits the allocated time intervals to the CU, and the CU sends the information about the time intervals to the terminal device, which further increases the random access delay of the terminal device. Based on this, the embodiment of the application also provides an information interaction method to shorten the time delay of the terminal device in the random access process.
Fig. 8 is a flowchart of an information interaction method according to an embodiment of the present application. The method can be applied to a terminal device, and referring to fig. 8, the method comprises the following steps:
step 801: and sending first information to the first network equipment by using the first user identity, wherein the first information is used for indicating that the terminal equipment suspends or stops receiving and sending signals by using the first user identity.
The first information is carried in a medium access control-layer control element (MAC CE) or a PHY signal, or included in the MAC CE or the PHY signal.
The MAC layer is located between a Radio Link Control (RLC) layer and a PHY layer. And when the MAC layer encapsulates the Data, obtaining a Protocol Data Unit (PDU). A MAC PDU may include four parts, one MAC header, 0 or more MAC Service Data Units (SDUs), 0 or more MAC CEs, or padding signals. In the embodiment of the present application, the terminal device may define a MAC CE to indicate the meaning of the first information. That is, a particular MAC CE element indicates suspension or cessation of signaling with the first subscriber identity. Alternatively, the embodiment of the present application may also generate a simple indication information, and use the indication information as the information content carried by the MAC CE.
When the first information is carried in the PHY signal, it may mean that the first information is represented by a specific PHY signal. That is, a particular PHY signal indicates that the signaling with the first subscriber identity is to be suspended or stopped.
It should be noted that, after receiving the first information, the first network device may learn, according to the first information, that the terminal device will stop receiving and sending signals with the first user identity next. At this time, the first network device will also pause or stop sending information to the terminal device.
Step 802: pausing or stopping the signaling and/or transmission with the first subscriber identity.
After sending the first information to the first network device, the terminal device may suspend or stop the signal reception and/or transmission with the first subscriber identity. That is, the transmission of information with the first subscriber identity is suspended or stopped, or the reception of information with the first subscriber identity is suspended or stopped, or the transmission and reception of information with the first subscriber identity is suspended or stopped. Since the terminal device has sent the first information to the first network device, that is, has notified the first network device that it will stop receiving and/or sending signals, the first network device may schedule the terminal device according to the information.
Step 803: and interacting with the second network equipment by using the second user identity.
After suspending or stopping the signal transmission and/or reception with the first subscriber identity, the terminal device may then transmit or receive data packets with the second network device with the second subscriber identity. And the terminal equipment can perform random access with the second user identity in the next time period. In the following time period, the terminal device has already suspended or stopped the signal receiving and/or transmitting with the first user identity, so that the terminal device will not occupy the receiver and/or the transmitter with the first user identity in the random access process with the second user identity, thus ensuring that the terminal device can timely receive and/or transmit messages with the second user identity, shortening the random access time delay and improving the success rate of the random access.
It should be noted that in this embodiment of the present application, the MAC CE or PHY signal is used to notify the first network device to suspend the interaction with the terminal device, so that the terminal device may perform the random access delay in the next time period with the second user identity. Because the transmission speed of the MAC CE and PHY signals is higher, the time delay of random access can be shortened.
Optionally, after the terminal device interacts with the second network device with the second user identity and completes the random access, the terminal device may further send, to the first network device, second information with the first user identity, where the second information is used to notify the first network device that the terminal device has started the signal reception and/or transmission with the first user identity. That is, after the random access is completed, the terminal device may notify the first network device by sending the second information to the first network device, and may then interact with the terminal device. The second information may also be carried in the MAC CE or PHY signal.
Optionally, after receiving the second information, the first network device may further feed back an acknowledgement indication to the terminal device to notify that the terminal device has received the second information. Wherein the acknowledgement indication may also be carried on the MAC CE or PHY signal.
Optionally, in a possible implementation manner, after the terminal device interacts with the second network device with the second user identity and completes the random access, the terminal device may further send, to the second network device, third information with the second user identity, where the third information is used to indicate that the signal reception and/or transmission with the second user identity is suspended or stopped; pausing or stopping the reception and/or transmission of signals with the second subscriber identity and starting the reception and/or transmission of signals with the first subscriber identity. That is, after the random access is completed, the terminal device may notify the second network device to suspend the reception and/or transmission and resume the interaction with the first network device with the first subscriber identity. The third information may also be carried in the MAC CE or PHY signal.
It should be noted that the information interaction method provided above may be used not only in the random access process, but also in other scenarios that require time division of the first user identity and the second user identity after the random access. The embodiment of the present application is described by taking a random access procedure as an example, and does not limit an application scenario of the embodiment of the present application.
It should be noted that the information interaction method provided above may coexist with a method in which the network device allocates the time period information to the first user identity and the second user identity in other manners. For example, before this embodiment, the network device has already allocated the period information to the first user identity and the second user identity, when the terminal device performs time division allocation by using the method of this embodiment, the use of the previously allocated period information may be suspended, and after the terminal device sends an indication message to the first network device or the second network device, the first network device and the second network device may resume the mode in which the information transmission is performed by the previously allocated period information in another manner, that is, it is not necessary to allocate the period information again in another manner between the first network device and the terminal device and between the second network device and the terminal device.
In this embodiment, the terminal device may send the first information to the first network device in the first user identity, so as to suspend or stop information reception and/or transmission with the first network device. The terminal device may then interact with the second network device with the second user identity. And the terminal equipment can perform random access with the second user identity in the next time period. In the following time interval, the terminal device has already paused or stopped the signal receiving and/or transmitting with the first user identity, so that the terminal device will not occupy the receiver or the transmitter with the first user identity in the random access process with the second user identity, thus ensuring that the terminal device can receive or transmit messages in time with the second user identity, shortening the random access time delay and improving the success rate of the random access. In addition, in the embodiment of the present application, the MAC CE or PHY signal is used to notify the first network device to suspend the interaction with the terminal device, so that the terminal device may perform random access delay in a next period with the second user identity. Because the transmission speed of the MAC CE and PHY signals is higher, the time delay of random access can be shortened. It should be noted that, since the terminal device informs the first network device that the information transceiving with the first user identity is to be suspended or stopped, the first network device does not blindly schedule resources for the terminal device, thereby avoiding resource waste.
Fig. 9 is a random access apparatus 900 according to an embodiment of the present application, and referring to fig. 9, the apparatus 900 includes:
a receiving module 901, configured to receive a first message sent by a terminal device with a first user identity, where the first message is used to indicate transmission time information of first downlink information, and the first downlink information is information received by the terminal device with a second user identity in a random access process.
A sending module 902, configured to execute step 602 in the foregoing embodiment.
Optionally, the transmission time information includes one or more of information of a random access response window, contention resolution duration, non-contention access resource configuration information, radio resource control RRC response waiting duration, and beam recovery duration;
the random access response window refers to a time window for the terminal device to wait for the second network device to return a random access response message in the random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window comprises a starting point and an end point of the random access response window;
the contention resolution duration refers to a duration for the terminal device to wait for the second network device to return contention resolution information in the random access process;
the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be used when the terminal equipment carries out random access in a non-competitive random access mode through the second user identity;
the RRC response waiting time duration refers to the time duration for the terminal equipment to wait for the second network equipment to return the RRC response message;
the beam recovery duration refers to a duration of random access of the terminal device in the beam recovery with the second user identity.
Optionally, the sending module 902 is specifically configured to:
determining uplink time domain resources and downlink time domain resources used by the terminal equipment in the first user identity;
and sending a second message to the terminal equipment according to the transmission time information and at least one of the uplink time domain resource and the downlink time domain resource.
Optionally, the second message is used to indicate a first transmission period and/or a second transmission period, where the first transmission period is a transmission period of the first downlink information, and the second transmission period is a transmission period of the second downlink information, where the second downlink information refers to information received by the terminal device with the first subscriber identity.
Optionally, the second message further comprises a validity period of the first transmission period.
In this embodiment, the first network device may return a transmission period indicating the first downlink information to the terminal device according to the transmission time information indicated by the first message sent by the terminal device. Therefore, the terminal device can determine the transmission time interval of the first downlink information according to the second message, and further receive the message sent by the second network device according to the transmission time interval of the first downlink information. Because the transmission time interval of the first downlink information is a time interval specially allocated for the first downlink information, the terminal device will not occupy the transceiver with the first user identity in the process of random access with the second user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of the random access can be improved.
Fig. 10 is another random access apparatus 1000 provided in this embodiment of the present application, which is applied to a terminal device, where the terminal device supports a first subscriber identity and a second subscriber identity, and referring to fig. 10, the apparatus 1000 includes:
a processing module 1001 configured to perform step 603 or step 701 in the foregoing embodiment;
a receiving module 1002, configured to perform step 604 or 702 in the foregoing embodiments.
Optionally, the processing module 1001 is specifically configured to:
the time allocation mode is determined according to a second message from the first network device, the second message being used for indicating a first transmission period and/or a second transmission period, the first transmission period being a transmission period of the first downlink information, the second transmission period being a transmission period of the second downlink information.
Optionally, the apparatus 1000 further comprises:
the sending module is configured to send a first message to the first network device, where the first message is used to indicate transmission time information of the first downlink information.
Optionally, the sending module is further configured to:
after the first message is sent, the first message is sent again to the first network device after a first time interval.
Optionally, the second message further comprises a validity period of the first transmission period.
Optionally, the processing module is specifically configured to:
the time allocation pattern is determined based on the transmission time information.
Optionally, the transmission time information includes one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, an RRC response waiting duration, and a beam recovery duration;
the random access response window refers to a time window for the terminal device to wait for the second network device to return a random access response message in the random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window comprises a starting point and an end point of the random access response window;
the contention resolution duration refers to an allowable waiting duration for waiting for the second network device to return contention resolution information in the random access process of the terminal device;
the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be adopted when the terminal equipment carries out random access in a non-competitive random access mode by using a second user identity;
the RRC response waiting time refers to the allowed waiting time for the terminal equipment to wait for the second network equipment to return the RRC response message;
the beam recovery duration refers to a duration of random access allowed by the terminal device in the second user identity during beam recovery.
Optionally, the apparatus is further configured to:
and pausing or stopping the first wireless link monitoring in a first time period, wherein the first time period refers to the transmission time period of the first downlink information indicated by the time allocation mode, and the first wireless link monitoring is carried out by the terminal equipment with the first user identity.
In this embodiment of the application, the terminal device may determine a time allocation mode, and receive, in a first downlink transmission period indicated by the time allocation mode, a message fed back by the second network device in the random access process with the second subscriber identity. Because the transmission time interval of the first downlink information is a time interval specially allocated for the first downlink information, the terminal device will not occupy the transceiver with the first user identity in the process of random access with the second user identity, so that the terminal device can be ensured to receive the information of the second network device in time, the random access time delay can be shortened, and the success rate of the random access can be improved. In addition, in the embodiment of the application, the terminal device directly determines the time allocation mode according to the transmission time information without sending the transmission time information to the network device for allocation, so that the inaccuracy of the network device allocation is avoided, the process of reporting the transmission time information by the terminal device is reduced, and the random access time delay is shortened.
It should be noted that: in the random access apparatus provided in the foregoing embodiment, only the division of the functional modules is illustrated when performing random access, and in practical applications, the functions may be allocated to different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the functions described above. In addition, the random access apparatus and the random access method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments and are not described herein again.
Fig. 11 is an information interaction apparatus 1100 according to an embodiment of the present application, where the apparatus may be applied to a terminal device, and the terminal device supports a first user identity and a second user identity, referring to fig. 11, the apparatus 1100 includes:
a transceiver module 1101 for performing steps 801 and 803 in the foregoing embodiments;
a processing module 1102 configured to execute step 802 in the foregoing embodiments.
Optionally, the transceiver module 1101 is further configured to: and sending second information to the first network equipment by using the first user identity, wherein the second information is used for informing the first network equipment that the signal receiving and/or sending with the first user identity is started.
Optionally, the transceiver module 1101 is further configured to: sending third information to the second network equipment by using the second user identity, wherein the third information is used for indicating that the signal receiving and/or sending are/is stopped by using the second user identity; the processing module 1102 is further configured to suspend or stop receiving and/or transmitting signals with the second user identity and initiate receiving and/or transmitting signals with the first user identity.
In this embodiment, the terminal device may send the first information to the first network device in the first user identity, so as to suspend or stop information reception and/or transmission with the first network device. The terminal device may then interact with the second network device with the second user identity. And the terminal equipment can perform random access with the second user identity in the next time period. In the following time interval, the terminal device has already paused or stopped the signal receiving and/or transmitting with the first user identity, so that the terminal device will not occupy the receiver or the transmitter with the first user identity in the process of random access with the second user identity, thus ensuring that the terminal device can receive or transmit messages in time with the second user identity, shortening the time delay of random access and improving the success rate of random access. In addition, in the embodiment of the present application, the MAC CE or PHY signal is used to notify the first network device to suspend the interaction with the terminal device, so that the terminal device may perform random access delay in a next period with the second user identity. Because the transmission speed of the MAC CE and PHY signals is higher, the time delay of random access can be shortened. It should be noted that, since the terminal device informs the first network device that the information transceiving with the first user identity is to be suspended or stopped, the first network device does not blindly schedule resources for the terminal device, thereby avoiding resource waste.
It should be noted that: in the information interaction apparatus provided in the above embodiment, only the division of the functional modules is illustrated when performing information interaction, and in practical applications, the functions may be distributed by different functional modules as needed, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the functions described above. In addition, the information interaction device and the information interaction method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
The methods described in the above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with embodiments of the invention, to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., Digital Versatile Disk (DVD)), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above-mentioned embodiments are provided not to limit the present application, and any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (29)

  1. A random access method applied to a first network device, the method comprising:
    receiving a first message sent by a terminal device with a first user identity, wherein the first message is used for indicating transmission time information of first downlink information, and the first downlink information is information received by the terminal device with a second user identity in a random access process;
    and sending a second message to the terminal equipment according to the first message, wherein the second message is used for indicating the transmission time interval of the first downlink information.
  2. The method of claim 1, wherein the transmission time information comprises one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, a Radio Resource Control (RRC) response waiting duration, and a beam recovery duration;
    the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
    the contention resolution duration refers to a duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
    the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be used when the terminal equipment carries out random access in a non-competitive random access mode through the second user identity;
    the RRC response waiting time length refers to the time length for the terminal equipment to wait for the second network equipment to return the RRC response message;
    the beam recovery duration refers to a duration of random access of the terminal device with the second user identity when performing beam recovery.
  3. The method according to claim 1 or 2, wherein the sending a second message to the terminal device according to the first message comprises:
    determining uplink time domain resources and downlink time domain resources used by the terminal equipment with a first user identity;
    and sending the second message to the terminal equipment according to the transmission time information and at least one of the uplink time domain resource and the downlink time domain resource.
  4. The method according to claim 3, wherein the second message is used to indicate a first transmission period and/or a second transmission period, the first transmission period is a transmission period of the first downlink information, the second transmission period is a transmission period of the second downlink information, and the second downlink information refers to information received by the terminal device with the first subscriber identity.
  5. The method of claim 4, wherein the second message further comprises a validity period of the first transmission period.
  6. A random access method is applied to a terminal device, wherein the terminal device supports a first user identity and a second user identity, and the method comprises the following steps:
    determining a time allocation mode, where the time allocation mode is used to indicate a transmission time period of first downlink information and/or second downlink information, the first downlink information is information received by a terminal device in a random access process with the second user identity, and the second downlink information is information received by the terminal device in a random access process with the first user identity;
    and receiving the first downlink information according to the time distribution mode.
  7. The method of claim 6, wherein determining the time allocation pattern comprises:
    determining the time allocation pattern according to a second message from a first network device, the second message indicating a first transmission period and/or a second transmission period, the first transmission period being a transmission period of the first downlink information, the second transmission period being a transmission period of the second downlink information.
  8. The method of claim 7, wherein prior to determining the time allocation pattern based on the second message from the first network device, further comprising:
    and sending a first message to the first network equipment, wherein the first message is used for indicating the transmission time information of the first downlink information.
  9. The method of claim 8, further comprising:
    after sending the first message, sending the first message to the first network device again after a first time interval.
  10. The method of any of claims 7-9, wherein the second message further comprises a validity period for the first transmission period.
  11. The method of claim 6, wherein determining the time allocation pattern comprises:
    and determining the time distribution mode according to the transmission time information.
  12. The method according to claim 8 or 11, wherein the transmission time information comprises one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, an RRC response waiting duration, and a beam recovery duration;
    the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
    the contention resolution duration refers to an allowable waiting duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
    the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be adopted when the terminal equipment carries out random access in a non-competitive random access mode by the second user identity;
    the RRC response waiting duration refers to an allowed waiting duration for the terminal device to wait for the second network device to return the RRC response message;
    the beam recovery duration refers to a duration of random access allowed by the terminal device when performing beam recovery with the second user identity.
  13. The method according to any one of claims 6-12, further comprising:
    suspending or stopping a first radio link monitoring within a first time period, the first time period being a transmission time period of the first downlink information indicated by the time allocation pattern, the first radio link monitoring being performed by the terminal device with a first subscriber identity.
  14. A random access apparatus, applied to a first network device, the apparatus comprising:
    a receiving module, configured to receive a first message sent by a terminal device with a first user identity, where the first message is used to indicate transmission time information of first downlink information, and the first downlink information is information received by the terminal device with a second user identity in a random access process;
    a sending module, configured to send a second message to the terminal device according to the first message, where the second message is used to indicate a transmission time period of the first downlink information.
  15. The apparatus of claim 14, wherein the transmission time information comprises one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, a Radio Resource Control (RRC) response waiting duration, and a beam recovery duration;
    the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
    the contention resolution duration refers to a duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
    the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be used when the terminal equipment carries out random access in a non-competitive random access mode through the second user identity;
    the RRC response waiting time length refers to the time length for the terminal equipment to wait for the second network equipment to return the RRC response message;
    the beam recovery duration refers to a duration of random access of the terminal device in the beam recovery with the second user identity.
  16. The apparatus according to claim 14 or 15, wherein the sending module is specifically configured to:
    determining uplink time domain resources and downlink time domain resources used by the terminal equipment with a first user identity;
    and sending the second message to the terminal equipment according to the transmission time information and at least one of the uplink time domain resource and the downlink time domain resource.
  17. The apparatus of claim 16, wherein the second message is configured to indicate a first transmission period and/or a second transmission period, the first transmission period is a transmission period of the first downlink information, the second transmission period is a transmission period of the second downlink information, and the second downlink information refers to information received by the terminal device with the first subscriber identity.
  18. The apparatus of claim 17, wherein the second message further comprises a validity period of the first transmission period.
  19. A random access apparatus, applied to a terminal device, wherein the terminal device supports a first subscriber identity and a second subscriber identity, the apparatus comprising:
    a processing module, configured to determine a time allocation mode, where the time allocation mode is used to indicate a transmission time period of first downlink information and/or second downlink information, where the first downlink information is information received by a terminal device in a random access process with the second user identity, and the second downlink information is information received by the terminal device in a random access process with the first user identity;
    and the receiving module is used for receiving the first downlink information according to the time distribution mode.
  20. The apparatus of claim 19, wherein the processing module is specifically configured to:
    determining the time allocation pattern according to a second message from a first network device, the second message indicating a first transmission period and/or a second transmission period, the first transmission period being a transmission period of the first downlink information, the second transmission period being a transmission period of the second downlink information.
  21. The apparatus of claim 20, further comprising:
    a sending module, configured to send a first message to the first network device, where the first message is used to indicate transmission time information of the first downlink information.
  22. The apparatus of claim 21, wherein the sending module is further configured to:
    after sending the first message, sending the first message to the first network device again after a first time interval.
  23. The apparatus of any of claims 20-22, wherein the second message further comprises a validity period for the first transmission period.
  24. The apparatus according to claim 19, wherein the processing module is specifically configured to:
    and determining the time distribution mode according to the transmission time information.
  25. The apparatus according to claim 8 or 11, wherein the transmission time information comprises one or more of information of a random access response window, a contention resolution duration, non-contention access resource configuration information, an RRC response waiting duration, and a beam recovery duration;
    the random access response window refers to a time window in which the terminal device waits for a second network device to return a random access response message in a random access process, and the information of the random access response window is the size of the random access response window, or the information of the random access response window includes a starting point and an ending point of the random access response window;
    the contention resolution duration refers to an allowable waiting duration for the terminal device to wait for the second network device to return contention resolution information in a random access process;
    the non-competitive access resource configuration information comprises random access time domain resources which are allowed to be adopted when the terminal equipment carries out random access in a non-competitive random access mode on the second user identity;
    the RRC response waiting duration refers to an allowed waiting duration for the terminal device to wait for the second network device to return the RRC response message;
    the beam recovery duration refers to a duration of random access allowed by the terminal device when performing beam recovery with the second user identity.
  26. The apparatus of any of claims 19-25, wherein the apparatus is further configured to:
    suspending or stopping a first radio link monitoring within a first time period, the first time period being a transmission time period of the first downlink information indicated by the time allocation pattern, the first radio link monitoring being performed by the terminal device with a first subscriber identity.
  27. A network device, comprising a processor and a communication interface;
    the processor is configured to execute a program of the random access method according to any one of claims 1 to 5, and the communication interface is configured to perform data transceiving.
  28. A terminal device, wherein the terminal device supports a first user identity and a second user identity, the terminal device comprising a processor and a communication interface;
    the processor is configured to execute the random access method according to any one of claims 6 to 13, and the communication interface is configured to perform data transceiving.
  29. A computer-readable storage medium having stored therein instructions which, when run on a computer, cause the computer to perform the random access method of any one of claims 1-5 or 6-13.
CN201980100853.3A 2019-09-30 2019-09-30 Random access method, device, equipment and storage medium Pending CN114450897A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/109680 WO2021062759A1 (en) 2019-09-30 2019-09-30 Random access method and apparatus, and device and storage medium

Publications (1)

Publication Number Publication Date
CN114450897A true CN114450897A (en) 2022-05-06

Family

ID=75336730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201980100853.3A Pending CN114450897A (en) 2019-09-30 2019-09-30 Random access method, device, equipment and storage medium

Country Status (2)

Country Link
CN (1) CN114450897A (en)
WO (1) WO2021062759A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014201689A1 (en) * 2013-06-21 2014-12-24 华为技术有限公司 Communication device access processing method and device, and communication system
US9544042B2 (en) * 2014-03-31 2017-01-10 Qualcomm Incorporated Opportunistic mobile receive diversity (OMRD) in a dual-SIM dual-active (DSDA) device
CN105636232B (en) * 2014-11-28 2019-03-15 联芯科技有限公司 A kind for the treatment of method and apparatus of random access procedure
CN108810905B (en) * 2017-05-04 2023-10-24 华为技术有限公司 Method and device for transmitting uplink channel and method and device for transmitting downlink channel

Also Published As

Publication number Publication date
WO2021062759A1 (en) 2021-04-08

Similar Documents

Publication Publication Date Title
US20200154323A1 (en) Method and Apparatus for Cellular Handovers Involving Sidelink Communications
WO2018196520A1 (en) Beam management method, terminal device, and network device
EP4027748A1 (en) Method for keeping mobile initiated connection only mode user equipment in connected mode
US20230050355A1 (en) Wus for paging for rrc inactive states
US20240007840A1 (en) Method for secondary cell state configuration, user equipment, and storage medium
WO2021179895A1 (en) Communication method and apparatus
CN113382379A (en) Wireless communication method and communication device
US20220132613A1 (en) Communication method and apparatus
CN111757436A (en) Discontinuous reception method and device
CN115885575A (en) Wireless communication method and communication device
CN113329493A (en) Communication method and device
CN111586852B (en) Communication method and device
WO2021109039A1 (en) Communication method, apparatus and device
CN113557773A (en) Assignment of a second UE identity to adjust paging timing of a UE for a wireless network
WO2021026929A1 (en) Communication method and apparatus
WO2021000322A1 (en) Proactive switching of v2x communication from sidelink connection to cellular connection
US20220287004A1 (en) Communication control method and user equipment
CN113950146B (en) Paging method and communication device
CN114450897A (en) Random access method, device, equipment and storage medium
CN115053626A (en) Multi-SIM UE assistance information with unavailability time
CN116982388A (en) Transmission in small data transmission mode
CN115150908A (en) Paging method and device
WO2021042387A1 (en) Communication method, device and apparatus
CN113873547A (en) Resource allocation method and device
CN114731616A (en) Paging conflict processing method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination